With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and even the Mac OS X with new attacks.

Trend Micro's Annual Security Roundup shows that most of our predictions for 2012 have come true, and we encapsulate 2012 as the year where threats launched the beginning of the post-PC era. Threats have now escalated past the desktop environment.

2012 ended with 350,000 threats for Android as detected by Trend Micro. Malware growth reached 14-3 for Android versus PC, and it only took Android three years to achieve the PC volume of malware threats achieved within fourteen years.

2012 is also the year that Java supplanted pure Windows-based threats in the attackers' cross-hairs leading, among other things, to the first widespread attack against the Mac.

Social media platforms continued to grow as areas of concern with attackers targeting them more, users putting themselves at risk by oversharing on them, and their legitimate services being co-opted to support cybercriminal activities.

Enterprises and organizations suffered from data breaches and targeted attacks at an alarming rate. In one incident alone, the Global Payments data breach, costs have already reached US$94 Million and are still climbing.

Targeted attacks are being helped along by the "children of STUXNET": attack code and kits like Flame, Duqu and Gauss that are derived from the STUXNET attack three years ago.

Attackers adopted more professional software development practices rather than introducing new attacks. The Blackhole Exploit Kit (BHEK), Automatic Transfer Systems (ATSs) and Ransomware were all refined and improved with new features in ways that would make any commercial software vendor proud

Repeating history

Key to this report is Trend Micro's documentation of the growing mobile-threat environment and reporting--Android Malware accomplishing in 3 years what PC threats took 14 years to do. What is also concerning is that only 20% of Android device owners use a security app.

This is not a risk worth taking, as by year end 2012 there were 350,000 threats facing this relatively new mobile platform. Trend Micro predicts that Android threats will increase to 1 million in 2013.

Along with advice for users and IT professionals, readers will find:

New data as it relates to Aggressive adware in mobile devices as well as data leakages that aren't always limited to malicious apps, since even popular and legitimate apps can disclose data.

Nigeria tops the list of Top 10 countries at risk of downloading malicious apps.

India leads the list of Top 10 countries at risk of privacy exposure.

Thailand cell phones suffer the most out of Top 10 Countries when it comes to the Most Battery-Draining Apps.

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.